CVE-2020-15917

common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 83%
VendorProductVersion
claws-mailclaws-mail
𝑥
< 3.17.6
opensusebackports_sle
15.0:sp1
opensusebackports_sle
15.0:sp2
opensuseleap
15.1
opensuseleap
15.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
claws-mail
bullseye
3.17.8-1
fixed
buster
no-dsa
stretch
no-dsa
bookworm
4.1.1-2
fixed
sid
4.3.0-1
fixed
trixie
4.3.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
claws-mail
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
dne
References